Solved

Can I view data on a symantec ghost image w/ out restoring the entire image ?

Posted on 2009-05-04
2
187 Views
Last Modified: 2013-12-02
Hello,

My firm used ghost images (symantec ghost) a long time ago. Since I've been here we've been using .iso (microsoft bdd). i have a bunch of dvds with old ghost images on them. is there anyway for me to view the files contained within these images (i.e. mounting an iso) w/ out having to find a way of restoring the entire ghost images ??   thanks in advance.
0
Comment
Question by:chaz21
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 63

Accepted Solution

by:
SysExpert earned 500 total points
ID: 24296997
If you have ghostexp.exe Ghost explorer from any version of Ghost Solution suite or Enterprise versions or maybe evn a personal version,. you should be able to explre and extract files from a *.gho

I hope this helps !
0
 

Author Comment

by:chaz21
ID: 24317438
thanks ghost explorer did the trick !!
0

Featured Post

Visualize your virtual and backup environments

Create well-organized and polished visualizations of your virtual and backup environments when planning VMware vSphere, Microsoft Hyper-V or Veeam deployments. It helps you to gain better visibility and valuable business insights.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

The article will include the best Data Recovery Tools along with their Features, Capabilities, and their Download Links. Hope you’ll enjoy it and will choose the one as required by you.
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
This tutorial will walk an individual through the process of configuring basic necessities in order to use the 2010 version of Data Protection Manager. These include storage, agents, and protection jobs. Launch Data Protection Manager from the deskt…
This tutorial will walk an individual through the process of installing the necessary services and then configuring a Windows Server 2012 system as an iSCSI target. To install the necessary roles, go to Server Manager, and select Add Roles and Featu…

688 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question